aboutsummaryrefslogtreecommitdiff
path: root/tlsdate-seccomp-x86.policy
diff options
context:
space:
mode:
authorJorge Lucangeli Obes <jorgelo@chromium.org>2012-12-12 10:21:01 -0800
committerJorge Lucangeli Obes <jorgelo@chromium.org>2013-01-04 10:27:51 -0800
commitf5d7bf80f755aa66810eb6bea4d4737ddb405909 (patch)
tree43d0384f0f25a0204a38eebce2822387c7a40081 /tlsdate-seccomp-x86.policy
parentc87e900c98a292c6e616957c9df101d28fb8eed3 (diff)
downloadtlsdate-f5d7bf80f755aa66810eb6bea4d4737ddb405909.tar.gz
Add Seccomp-BPF policies to the repo.
These policies can be used with the Minijail tool (http://git.chromium.org/gitweb/?p=chromiumos/platform/minijail.git) to achieve kernel attack surface reduction. (Also fix some trailing whitespace.) BUG=chromium-os:36653 TEST=None Change-Id: I35dd74702f7dfd701c86e1b25b0831d3925fbf96 Signed-off-by: Jorge Lucangeli Obes <jorgelo@chromium.org>
Diffstat (limited to 'tlsdate-seccomp-x86.policy')
-rw-r--r--tlsdate-seccomp-x86.policy47
1 files changed, 47 insertions, 0 deletions
diff --git a/tlsdate-seccomp-x86.policy b/tlsdate-seccomp-x86.policy
new file mode 100644
index 0000000..da790c9
--- /dev/null
+++ b/tlsdate-seccomp-x86.policy
@@ -0,0 +1,47 @@
+open: 1
+mmap2: 1
+read: 1
+close: 1
+fstat64: 1
+stat64: 1
+munmap: 1
+mprotect: 1
+time: 1
+socketcall: 1
+_llseek: 1
+brk: 1
+write: 1
+execve: 1
+fcntl64: 1
+gettimeofday: 1
+poll: 1
+access: 1
+set_thread_area: 1
+waitpid: 1
+exit_group: 1
+rt_sigprocmask: 1
+getuid32: 1
+clone: 1
+rt_sigaction: 1
+# Allow request == RTC_SET_TIME || request == FIONREAD
+ioctl: arg1 == 0x4024700a || arg1 == 0x541b
+setgid32: 1
+setgroups32: 1
+setresuid32: 1
+settimeofday: 1
+restart_syscall: 1
+setresgid32: 1
+nanosleep: 1
+exit: 1
+rt_sigreturn: 1
+rename: 1
+select: 1
+_newselect: 1
+clock_gettime: 1
+clock_settime: 1
+futex: 1
+getrlimit: 1
+ugetrlimit: 1
+set_robust_list: 1
+set_tid_address: 1
+uname: 1